Sort by
Refine Your Search
-
information, redesign processes, and support the University's investigative processes; collaborates and coordinates with compliance partners within the department and across the institution to support the
-
General Counsel, Student Life, Human Resources, Public Safety, Provost Office, Office for Faculty Advancement to disseminate information, redesign processes, and support the University's investigative
-
: Work closely with senior DBAs, developers, external vendors and other IT teams to ensure the smooth operation of database systems in support of business applications. On-Call Support: Participate in
-
of animals within facility. Policy and Procedure Interpretation Major role in establishing, reviewing, updating and implementing ULAR’s Standard Operating Procedures. Assists in the development of university
-
. Minimum 2 years’ experience in the provision of Motivational Interviewing (MI), Trauma-Focused Cognitive Behavioral Therapy (TF-CBT), Cognitive Processing Therapy (CPT) preferred, or other evidence-based
-
engagement approach, and community-engagement efforts. It also includes managing processes, procedures, data collection and management, and reporting for a clinical trial. This individual will also contribute
-
Computing Systems, Systems Programming and Computer Networks Computer Security and Privacy Computer Game Design and Implementation AI and Machine Learning Software Engineering Adjunct Faculty are generally
-
improvements and identify efficiencies within the Facilities O&M business operation. Required Qualifications Minimum of bachelor's degree in data science or a related field OR the equivalent combination
-
; testifies in criminal justice proceedings. Completes detailed reports and documentation essential to the effective operation of the Department and to support criminal and internal investigations. Provides
-
positions in Information Science. The Information Science Department offers undergraduate and graduate level programs and courses in data science, computing security technology, human-computer interaction